Privacy and Trust in Ambient Intelligent Environments

Privacy and trust are critical factors for the acceptance and success of next generation ambient intelligent environments. Those environments often act autonomously to support a user’s activity based on context information gathered from ubiquitous sensors. The autonomous nature, their accessibility to large amounts of personal information, and the fact that actuators and sensors are invisibly embedded in such environments, raise several privacy issues for users. Those issues need to be addressed by adequate mechanisms for privacy protection and trust establishment. In this chapter, we provide an overview of existing privacy enhancing technologies (PETs) in the area of ambient intelligent environments and present novel adaptive privacy mechanisms as used in the ATRACO architecture and in an ambient calendar system. Further, we will discuss how computational trust mechanisms and social trust aspects can be utilized to support privacy protection and the establishment of trust between system components and between the system and users. After describing the integration of these mechanisms in the overall system architecture of ATRACO, we conclude by giving an outlook on future directions in this area.

[1]  Florian Schaub Dynamic privacy adaptation in ubiquitous computing , 2014 .

[2]  Michael Rovatsos,et al.  Using trust for detecting deceitful agents in artificial societies , 2000, Appl. Artif. Intell..

[3]  Ninghui Li,et al.  Design of a role-based trust-management framework , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.

[4]  Hector Garcia-Molina,et al.  EigenRep: Reputation Management in P2P Networks , 2003 .

[5]  R. Perlman,et al.  An overview of PKI trust models , 1999, IEEE Netw..

[6]  Jorge Lobo,et al.  Privacy-aware role-based access control , 2010 .

[7]  Megan Tschannen-Moran,et al.  A Multidisciplinary Analysis of the Nature, Meaning, and Measurement of Trust , 2000 .

[8]  Marc Langheinrich,et al.  Privacy in Ubiquitous Computing , 2014 .

[9]  Mark Weiser,et al.  Some computer science issues in ubiquitous computing , 1993, CACM.

[10]  Michael Weber,et al.  PriCal: context-adaptive privacy in ambient calendar displays , 2014, UbiComp.

[11]  Jordi Sabater-Mir,et al.  Review on Computational Trust and Reputation Models , 2005, Artificial Intelligence Review.

[12]  Marc Langheinrich,et al.  A Privacy Awareness System for Ubiquitous Computing Environments , 2002, UbiComp.

[13]  William A. Wallace,et al.  Trust in electronic environments , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.

[14]  Shanshan Song,et al.  Trusted P2P transactions with fuzzy reputation aggregation , 2005, IEEE Internet Computing.

[15]  Abigail Sellen,et al.  Design for Privacy in Ubiquitous Computing Environments , 1993, ECSCW.

[16]  Sissela Bok,et al.  Secrets: On the Ethics of Concealment and Revelation , 1982 .

[17]  Michael Rohs,et al.  Social, Economic, and Ethical Implications of Ambient Intelligence and Ubiquitous Computing , 2005, Ambient Intelligence.

[18]  E. Gerck Overview of Certification Systems: X.509, CA, PGP and SKIP , 1999 .

[19]  James A. Landay,et al.  Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing , 2002, UbiComp.

[20]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[21]  Ling Liu,et al.  PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.

[22]  Nick Cercone,et al.  A Bayesian Network Approach to Detecting Privacy Intrusion , 2006, 2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops.

[23]  Helen Nissenbaum,et al.  Privacy in Context - Technology, Policy, and the Integrity of Social Life , 2009 .

[24]  B. Solhaug,et al.  Why Trust is not Proportional to Risk , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).

[25]  Peter Langendörfer,et al.  Enhancing Privacy by Applying Information Flow Modelling in Pervasive Systems , 2007, OTM Workshops.

[26]  Norman L. Chervany,et al.  Trust and Distrust Definitions: One Bite at a Time , 2000, Trust in Cyber-societies.

[27]  Sandra Steinbrecher Design Options for Privacy-Respecting Reputation Systems within Centralised Internet Communities , 2006, SEC.

[28]  Vladimiro Sassone,et al.  Trust models in ubiquitous computing , 2008, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.

[29]  Marc Langheinrich,et al.  Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.

[30]  Jeffrey S. Rosenschein,et al.  Supporting Privacy in Decentralized Additive Reputation Systems , 2004, iTrust.

[31]  Jason I. Hong,et al.  End-User Privacy in Human-Computer Interaction , 2007, Found. Trends Hum. Comput. Interact..

[32]  S. Margulis On the Status and Contribution of Westin's and Altman's Theories of Privacy , 2003 .

[33]  Frank Stajano,et al.  Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..

[34]  Diana K. Smetters,et al.  How users use access control , 2009, SOUPS.

[35]  H. P Gassmann,et al.  OECD guidelines governing the protection of privacy and transborder flows of personal data , 1981 .

[36]  Peter Bodorik,et al.  Sociotechnical architecture for online privacy , 2005, IEEE Security & Privacy Magazine.

[37]  Karl Aberer,et al.  Managing trust in a peer-2-peer information system , 2001, CIKM '01.

[38]  Svetha Venkatesh,et al.  Dynamic privacy assessment in a smart house environment using multimodal sensing , 2008, TOMCCAP.

[39]  Stephen Marsh,et al.  Formalising Trust as a Computational Concept , 1994 .

[40]  John Krumm,et al.  A survey of computational location privacy , 2009, Personal and Ubiquitous Computing.

[41]  Jadwiga Indulska,et al.  Context Privacy and Obfuscation Supported by Dynamic Context Source Discovery and Processing in a Context Management System , 2007, UIC.

[42]  Stephen Hailes,et al.  Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[43]  James A. Landay,et al.  An architecture for privacy-sensitive ubiquitous computing , 2004, MobiSys '04.

[44]  Jaijit Bhattacharya,et al.  Utilizing Network Features for Privacy Violation Detection , 2006, 2006 1st International Conference on Communication Systems Software & Middleware.

[45]  P Pafko,et al.  [Right to privacy]. , 2013, Rozhledy v chirurgii : mesicnik Ceskoslovenske chirurgicke spolecnosti.

[46]  Louis D. Brandeis,et al.  The Right to Privacy , 1890 .

[47]  Juan Carlos Augusto,et al.  Learning patterns in ambient intelligence environments: a survey , 2010, Artificial Intelligence Review.

[48]  N. Shahmehri,et al.  An Integration of Reputation-based and Policy-based Trust Management , 2005 .

[49]  Audun Jøsang,et al.  A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..

[50]  Jorge Lobo,et al.  Privacy-aware role based access control , 2009, SACMAT '07.

[51]  Lars Kulik,et al.  A Formal Model of Obfuscation and Negotiation for Location Privacy , 2005, Pervasive.

[52]  Florian Schaub,et al.  Territorial privacy in ubiquitous computing , 2011, 2011 Eighth International Conference on Wireless On-Demand Network Systems and Services.

[53]  Bruce Schneier,et al.  Ten Risks of PKI , 2004 .

[54]  Joan Feigenbaum,et al.  Compliance Checking in the PolicyMaker Trust Management System , 1998, Financial Cryptography.

[55]  Robert Ellis Smith,et al.  Ben Franklin's Web Site: Privacy and Curiosity from Plymouth Rock to the Internet , 2000 .

[56]  Morris Sloman,et al.  A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.

[57]  Rino Falcone,et al.  Trust Theory: A Socio-Cognitive and Computational Model , 2010 .

[58]  Javier Carbó,et al.  TRUST MANAGEMENT THROUGH FUZZY REPUTATION , 2003 .

[59]  Diane J. Cook,et al.  Author's Personal Copy Pervasive and Mobile Computing Ambient Intelligence: Technologies, Applications, and Opportunities , 2022 .

[60]  Ketil Stølen,et al.  Evolution in Relation to Risk and Trust Management , 2010, Computer.

[61]  Marco Gruteser,et al.  USENIX Association , 1992 .

[62]  Michael Weber,et al.  Towards Territorial Privacy in Smart Environments , 2010, AAAI Spring Symposium: Intelligent Information Privacy Management.

[63]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[64]  Carles Sierra,et al.  An information-based model for trust , 2005, AAMAS '05.